Vulnerability Details : CVE-2015-6251
Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2015-6251
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:gnutls:3.4.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6251
6.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6251
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2015-6251
-
http://www.securityfocus.com/bid/76267
GnuTLS 'common.c' Double Free Denial of Service Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html
[SECURITY] Fedora 23 Update: gnutls-3.4.4-1.fc23
-
http://www.openwall.com/lists/oss-security/2015/08/10/1
oss-security - CVE request: GNUTLS-SA-2015-3 double free in certificate DN decoding
-
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
GnuTLSVendor Advisory
-
http://www.debian.org/security/2015/dsa-3334
Debian -- Security Information -- DSA-3334-1 gnutls28
-
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
1251902 – (CVE-2015-6251) CVE-2015-6251 gnutls: double free flaw in certificate DN decoding (GNUTLS-SA-2015-3)
-
http://www.securitytracker.com/id/1033226
GnuTLS Double Free Memory Error in DN Decoding Lets Remote Users Cause the Target Service to Crash - SecurityTracker
-
http://www.openwall.com/lists/oss-security/2015/08/17/6
oss-security - Re: CVE request: GNUTLS-SA-2015-3 double free in certificate DN decoding
-
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
Reset the output value on error in _gnutls_x509_dn_to_string() (27285436) · Commits · gnutls / GnuTLS · GitLab
-
http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html
openSUSE-SU-2015:1499-1: moderate: Security update for gnutls
Jump to